Connect with us
DAPA Banner

Tech

AirPods Max 2 Hit Lowest Price Ever in Early Mother’s Day Sale

Published

on

Get the lowest price ever on AirPods Max 2 over-ear headphones.

Apple’s new AirPods Max 2 have dropped to the lowest price ever, making now a great time to pick up the over-ear headphones as a gift for Mom this Mother’s Day.

AirPods Max 2 are now $40 off at Amazon and Walmart, as both retailers compete for your business this week.

With Mother’s Day on May 10, there’s still time to pick up a pair for Mom and have them delivered by Sunday (check the ETA for your individual shipping address, though, to confirm).

Advertisement

Apple AirPods Max 2 features

AirPods Max 2, which were announced in March 2026, are equipped with Apple’s H2 chip. The chip offers enhanced sound quality and better Active Noise Cancellation (ANC) compared to the first-generation AirPods Max.

About AirPods Max 2

  • Powered by Apple’s H2 chip
  • Up to 1.5x more Active Noise Cancellation than first-gen AirPods Max
  • Transparency mode
  • Adaptive EQ
  • Lossless Audio and ultra-low latency audio via a wired USB-C connection (requires a supported service)

In our hands-on 1-month AirPods Max 2 review, the latest model received a solid four-star rating out of five.

If you’re open to buying the first-gen AirPods Max, closeout deals are in effect on remaining inventory, with Amazon running a $100 discount on the purple colorway, bringing the price down to $449.

You can also compare prices across retailers in our AirPods Max Price Guide and peruse the week’s best AirPods deals in our dedicated roundup.

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

Home Office seeks three CTOs to keep borders, passports, and core IT ticking

Published

on

Public Sector

Roles span eGates, passports, visas, asylum applications, and enterprise services – yours for up to £105K

The Home Office’s digital division
is recruiting three chief technology officers (CTOs) for
migration and borders and enterprise services, each paid
£81,000 to £105,000 a year.

It is looking for two CTOs for
Migration and Borders Digital, which runs passport control eGates and
electronic travel authorizations, which people notice when they go down or start working differently. The unit’s other high-profile systems include those
supporting passenger data services, digital identity, visas, asylum
applications, and immigration status.

Advertisement

“Applying for a passport is now a
seamless, self-service experience where renewals are printed and
dispatched in just 48 hours,” writes Mike McCarthy, the
department’s director general for digital and innovation, in
material published with the job ad. “Our airport eGates support 76
million UK border crossings each year, with digitally assisted
electronic travel authorisation decisions made in just 45 seconds.”

“These aren’t just technical
achievements. They are real, measurable changes to improve millions
of people’s lives, and we’re extremely proud of the difference
we’ve made so far,” he adds of Home Office Digital, the name the department has adopted for its IT function.

McCarthy is himself a recent recruit,
having joined the Home Office in January after working for consultancy McKinsey and spending eight years in the British Army’s Corps of Royal Engineers. According to the job ad from last September, he is paid £160,000 and
oversees 4,000 people with a budget of £1.8 billion.

Home Office Digital is also looking
for a CTO for its enterprise services unit, which designs, builds, and
operates core services including networks, end user services, and
operational support for more than 35,000 users. McCarthy writes that
the department has “moved most of our technology services into the
cloud, saving money while boosting efficiency.”

Advertisement

The department expects successful
applicants to agree to serve for at least three years, although this
is not a contractual requirement, and undertake the Security Check
level of national security clearance. They can be based in Cardiff,
Croydon, Glasgow, Manchester, or Sheffield. Applications close at 11:55pm BST on Sunday, May 24, with interviews expected to take place in early July. ®

Source link

Continue Reading

Tech

You can’t firewall a conversation: how AI red-teaming became mission-critical

Published

on

The explosion of AI usage since 2023 is unprecedented. In terms of adoption, AI is moving faster than cloud, faster than mobile, and certainly faster than the internet did. Research group Gartner predicts that 80% of enterprises will deploy AI tools this year.

Donnchadh Casey

VP for AI Security at F5.

Advertisement

When we classify a company’s journey through AI adoption, we see maturity falling into four categories:

  • Category 1 is general purpose AI and productivity – think employees using ChatGPT, Gemini, CoPilot, etc
  • Category 2 is when organizations have internal use cases, building custom chatbots for HR or IT, for example
  • Category 3 includes external use cases like building public-facing GenAI applications, like customer service chatbots
  • Category 4 is agentic workflows which are made up of complex systems that take actions autonomously on behalf of users

Source link

Advertisement
Continue Reading

Tech

Roku and TCL face lawsuit over software updates that allegedly brick smart TVs

Published

on


The lawsuit alleges that a series of updates pushed to certain Roku-powered TVs introduced recurring issues that, in some cases, rendered the devices unusable. The models named include Roku Select Series and Roku Plus Series sets, along with TCL’s 3-, 4-, 5-, and 6-series TVs running Roku OS.
Read Entire Article
Source link

Continue Reading

Tech

Valve Releases Steam Controller CAD Files Under Creative Commons License

Published

on

Valve has released CAD files for the new Steam Controller and its Puck under a Creative Commons license. “The idea is to let enterprising modders create their own Steam Controller add-ons, like skins, charging stands, grip extenders or smartphone mounts,” reports Digital Foundry. From the report: The Valve release includes files for the external shell (“surface topology”) of the Controller and Puck, with a .STP, .STL and engineering diagram of each device, with the latter showing areas that must remain uncovered to let the device maintain its signal strength and otherwise function as designed. Valve has previously released CAD files for its Steam Deck handheld, Valve Index VR suite and even the original Steam Controller a decade ago, so this release is welcomed but not unexpected.

The release is under a fairly restrictive Creative Commons license which allows for non-commercial use and requires attribution and sharing of designs back to the community. However, the license also suggests that commercial entities interested in making accessories for the Steam Controller or its Puck can contact Valve directly to discuss terms. You can find the files here.

Source link

Continue Reading

Tech

Sam Altman’s Management Style Comes Under the Microscope At OpenAI Trial

Published

on

Sam Altman’s management style came under scrutiny on the seventh day of Elon Musk’s high-stakes OpenAI trial, as former OpenAI figures Mira Murati, Shivon Zilis, and Helen Toner took the stand to testify about their experiences working with him. Their testimony resurfaced many of the criticisms that first emerged during Altman’s brief ouster as CEO in 2023. An anonymous reader quotes a report from Business Insider: The first witness was Mira Murati, OpenAI’s former chief technology officer and now founder of her own AI shop, Thinking Machines Lab. Jurors watched a recorded video deposition of Murati, who was also OpenAI’s interim CEO after the board briefly ousted Sam Altman. Murati’s testimony focused on her concerns about Altman’s “difficult and chaotic” management style. She said Altman had trouble “making decisions on big controversial things.” He also had a habit of telling people what they wanted to hear.

“My concern was about Sam saying one thing to one person and a completely different thing to another person, and that makes it a very difficult and chaotic environment to work with,” said Murati. Murati said that her issue with Altman was not about safety, “it is about Sam creating chaos.” She said she supported Altman’s return to OpenAI because the company “was at catastrophic risk of falling apart” at the time of his ousting. “I was concerned about the company completely blowing up.”

Zilis said she was upset that Altman rolled out ChatGPT without involving the board. “It wasn’t just me but the entire board raised concern about that whole thing happening without any board communication,” she said. Zilis said she was also concerned about a potential OpenAI deal with a nuclear energy startup called Helion Energy because both Altman and Greg Brockman were investors. Although the executives had disclosed the investment to the board, Zilis said the deal talk made her uneasy. It “felt super out of left field,” she said. “How is it the case that we want to place a major bet on a speculative technology?”

In a video deposition, Helen Toner, a former member of OpenAI’s board who resigned in 2023, said she first became aware of ChatGPT’s release when an OpenAI employee asked another board member whether the board was aware of the development. […] Toner also elaborated on why the board, including herself, voted to remove Altman as CEO in 2023. “There were a number of things — the pattern of behavior related to his honesty and candor, his resistance of board oversight, as well as the concerns that two os his inner management team raised to the board about his management practices, his manipulation of board processes,” said Toner. Recap:

Brockman Rebuts Musk’s Take On Startup’s History, Recounts Secret Work For Tesla (Day Six)
OpenAI President Discloses His Stake In the Company Is Worth $30 Billion (Day Five)
Musk Concludes Testimony At OpenAI Trial (Day Four)
Elon Musk Says OpenAI Betrayed Him, Clashes With Company’s Attorney (Day Three)
Musk Testifies OpenAI Was Created As Nonprofit To Counter Google (Day Two)
Elon Musk and OpenAI CEO Sam Altman Head To Court (Day One)

Advertisement

Source link

Continue Reading

Tech

Largest U.S. carrier-based drone moves closer to operational reality after successful two-hour autonomous test flight

Published

on


  • Autonomous tanker drone completed two-hour maiden flight validating core flight systems
  • MQ-25A will replace fighter jets in aerial refueling role aboard carriers
  • Further testing planned before transition to carrier qualification operations in Maryland

The US Navy’s MQ-25A Stingray autonomous tanker drone, the service’s first operational unmanned aerial refueler, has completed its maiden flight.

The two-hour test took place over southern Illinois, where the aircraft carried out a series of maneuvers to validate its basic flight controls and onboard operations.

Source link

Continue Reading

Tech

KitchenAid Semi-Automatic Espresso Machine review: an exceptional coffee maker that’s a joy to use and look at

Published

on

Why you can trust TechRadar


We spend hours testing every product or service we review, so you can be sure you’re buying the best. Find out more about how we test.

KitchenAid Semi-Automatic Espresso Machine two-minute review

In a crowded market where there are so many fantastic coffee machines, the KitchenAid Semi-Automatic Espresso Machine stands out by being one of the better-looking options on the market. Not only does it look premium, but it feels it too. This machine is solidly built, and the supplied accessories including the removable bean hopper, porta filter and tamper, have a decent amount of weight to them, further adding to the overall premiumness of the machine.

It’s available in a range of colors, but I feel my review unit in Porcelain (white) will be the easiest to match with kitchen decor (although I have to admit taking a fancy to the Juniper green, too).

Advertisement

Source link

Continue Reading

Tech

Single Dose of Magic Mushroom Psychedelic Can Cause Anatomical Brain Changes

Published

on

A small study found that a single 25mg dose of psilocybin produced measurable brain changes that were still visible a month later, along with reported improvements in psychological insight, wellbeing, and mental flexibility. The Guardian reports: Evidence for the changes came from specialized scans that measured the diffusion of water along nerve bundles in the brain. They suggested that some nerve tracts had become denser and more robust after the drug was taken. While the findings are preliminary, the scientists said the opposite was seen in ageing and dementia. “It’s remarkable to see potential anatomical brain changes one month after a single dose of any drug,” said Prof Robin Carhart-Harris, a neurologist at the University of California, San Francisco, and senior author on the study. “We don’t yet know what these changes mean, but we do note that overall, people showed positive psychological changes in this study, including improved wellbeing and mental flexibility.”

[…] Writing in Nature Communications, the researchers describe another key finding. Those who had the largest spike in brain entropy after psilocybin were most likely to report deeper psychological insight and better wellbeing a month later, underlining the link between flexible thinking and improved mental health. “It suggests a psychobiological therapeutic action for psilocybin,” said Carhart-Harris. Prof Alex Kwan, a neuroscientist at Cornell University in New York, said studies in mice had shown that psychedelics can rewire connections between nerves, a form of “plasticity” that could underlie their therapeutic effects. The big question is whether the same occurs in humans. “This study comes closer than most to addressing that question, by giving evidence of lasting changes in brain structure after psychedelic use,” he said. But while the results were “exciting,” the study involved a small number of people and DTI provides an indirect and limited view of brain connections, he said.

Source link

Continue Reading

Tech

Another US Navy ‘Flattop’ Just Got A New Lease On Life

Published

on





In April 2026, the U.S. Navy delayed decommissioning its oldest active aircraft carrier — the USS Nimitz — by 10 months. The decision to keep the USS Nimitz in service was the result of the delay in the induction of the USS John F. Kennedy — a brand new aircraft carrier still undergoing sea trials — to the naval fleet. This new Ford-class aircraft carrier is expected to join service in 2027, after which the USS Nimitz can finally sail into the sunset.

As it turns out, the USS Nimitz is not the only large “flattop” — or a vessel with a full-length, flat flight deck  — that has had its lifespan extended. The USS Wasp (LHD-1), an amphibious assault ship, also recently received a fresh lease on life. While these ships typically last about 40 years, which would put its decommissioning date sometime in 2029, this vessel is now scheduled to remain in service until 2034. 

The USS Wasp is the first of eight Wasp-class amphibious assault ships made for the U.S. Navy. This vessel has seen a lot during its time in service and even underwent a major refurbishment in 2019, resuming active duty in July 2022. The USS Wasp is a large vessel that you may mistake for a full-fledged aircraft carrier. Stretching 844 feet long, it displaces 41,000 tons and can hold up to 31 aircraft of various types. It is commanded by a crew of over 1,200 sailors and can accommodate an additional 1,000 troops during wartime deployments.

Advertisement

Why this Wasp-class ships got a new lease on life

As with the USS Nimitz, the service extension for Wasp-class vessels is primarily driven by the delay in the induction of newer, more modern replacements. As of this writing, the U.S. Navy was operating seven Wasp-class amphibious assault ships. While a total of eight ships were built, the USS Bonhomme was decommissioned in 2020 after being extensively damaged in a fire. The other Wasp-class vessels in service are also being considered for extensive refurbishment and service extension, although the details of those plans remain under wraps.

These aging Wasp-class chips were intended to be complemented by the newer America-class vessels. However, the production of these newer vessels has been delayed by several years, and of the planned 11 ships, only two — the USS America (LHA-6) and the USS Tripoli (LHA-7) — have been commissioned. The next two vessels in the lineup — the USS Bougainville (LHA-8) and the USS Fallujah (LHA-9) — are still under construction, with commissioning expected after 2027 and 2031, respectively.

Advertisement



Source link

Advertisement
Continue Reading

Tech

One command turns any open-source repo into an AI agent backdoor. OpenClaw proved no supply-chain scanner has a detection category for it

Published

on

Just two months ago, researchers at the Data Intelligence Lab at the University of Hong Kong introduced CLI-Anything, a new state-of-the-art tool that analyzes any repo’s source code and generates a structured command line interface (CLI) that AI coding agents can operate with a single command.

Claude Code, Codex, OpenClaw, Cursor, and GitHub Copilot CLI are all supported, and since its launch in March, CLI‑Anything has climbed to more than 30,000 GitHub stars.

But the same mechanism that makes software agent-native opens the door to agent-level poisoning. The attack community is already discussing the implications on X and security forums, translating CLI-Anything’s architecture into offensive playbooks.

The security problem is not what CLI-Anything does. It is what CLI-Anything represents.

Advertisement

CLI-Anything generates SKILL.md files, the same instruction-layer artifacts that Snyk’s ToxicSkills research found laced with 76 confirmed malicious payloads across ClawHub and skills.sh in February 2026. A poisoned skill definition does not trigger a CVE and never appears in a software bill of materials (SBOM). No mainstream security scanner has a detection category for malicious instructions embedded in agent skill definitions, because the category simply did not exist eighteen months ago.

Cisco confirmed the gap in April. “Traditional application security tools were not designed for this,” Cisco’s engineering team wrote in a blog post announcing its AI Agent Security Scanner for IDEs. “SAST [static application security testing] scanners analyze source code syntax. SCA [software composition analysis] tools check dependency versions. Neither understands the semantic layer where MCP [Model Context Protocol] tool descriptions, agent prompts, and skill definitions operate.”

Merritt Baer, CSO of Enkrypt AI and former Deputy CISO at Amazon Web Services (AWS), told VentureBeat in an exclusive interview: “SAST and SCA were built for code and dependencies. They don’t inspect instructions.”

This is not a single-vendor vulnerability. It is a structural gap in how the entire security industry monitors software supply chains. This is the pre-exploitation window. CLI-Anything is live, the attack community is discussing it, and security directors who act now get ahead of the first incident report.

Advertisement

The integration layer no stack can see

Traditional supply-chain security operates on two layers. The code layer is where SAST works, scanning source files for insecure patterns, injection flaws, and hardcoded secrets. The dependency layer is where SCA works, checking package versions against known vulnerabilities, generating SBOMs, and flagging outdated libraries.

Agent bridge tools like CLI-Anything, MCP connectors, Cursor rules files, and Claude Code skills operate on a third layer between the other two. Call it the agent integration layer: configuration files, skill definitions, and natural-language instruction sets tell an AI agent what software can do and how to operate it. None of it looks like code. All of it executes like code.

Carter Rees, VP of AI at Reputation, told VentureBeat in an exclusive interview: “Modern LLMs [large language models] rely on third-party plugins, introducing supply chain vulnerabilities where compromised tools can inject malicious data into the conversation flow, bypassing internal safety training.”

Researchers at Griffith University, Nanyang Technological University, the University of New South Wales, and the University of Tokyo documented the attack chain in an April paper, “Supply-Chain Poisoning Attacks Against LLM Coding Agent Skill Ecosystems.” The team introduced Document-Driven Implicit Payload Execution (DDIPE), a technique that embeds malicious logic inside code examples within skill documentation.

Advertisement

Across four agent frameworks and five large language models, DDIPE achieved bypass rates between 11.6% and 33.5%. Static analysis caught most samples, but 2.5% evaded all four detection layers. Responsible disclosure led to four confirmed vulnerabilities and two vendor fixes.

The kill chain security leaders need to audit

Here’s the anatomy of the kill chain: An attacker submits a SKILL.md file to an open-source project containing setup instructions, code examples, and configuration templates. It looks like standard documentation. A code reviewer would wave it through because none of it is executable. But the code examples contain embedded instructions that an agent will parse as operational directives.

A developer uses an agent bridge tool to connect their coding agent to the repository. The agent ingests the skill definition and trusts it, because no verification layer exists to distinguish benign from malicious intent at the instruction level.

The agent executes the embedded instruction using its own legitimate credentials. Endpoint detection and response (EDR) sees an approved API call from an authorized process and passes it. Data exfiltration, configuration changes, and credential harvesting are all moving through channels that the monitoring stack considers normal traffic.

Advertisement

Rees identified the structural flaw that makes this chain lethal. “A significant vulnerability in enterprise AI is broken access control, where the flat authorization plane of an LLM fails to respect user permissions,” he told VentureBeat. A compromised skill definition riding that flat authorization plane does not need to escalate privileges. It already has them. Every link in that chain is invisible to the current security stack.

Pillar Security demonstrated a variant of this chain against Cursor in January 2026 (CVE-2026-22708). Implicitly trusted shell built-in commands could be poisoned through indirect prompt injection, converting benign developer commands into arbitrary code execution vectors. Users saw only the final command. The poisoning happened through other commands the IDE never surfaced for approval.

The evidence is already in production

In a documented attack chain from April 2026, a crafted GitHub issue title triggered an AI triage bot wired into Cline. The bot exfiltrated a GITHUB_TOKEN, which the attacker used to publish a compromised npm dependency that installed a second agent on roughly 4,000 developer machines for eight hours. There was just one issue title. Attackers had eight hours of access. No human approved the action.

Snyk’s ToxicSkills audit scanned 3,984 agent skills from ClawHub, the public marketplace for the OpenClaw agent framework, and skills.sh in February 2026. The results: 13.4% of all skills contained at least one critical security issue. Daily skill submissions jumped from less than 50 in mid-January to more than 500 by early February. The barrier to publishing was a SKILL.md markdown file and a GitHub account one week old. No code signing. No security review. No sandbox.

Advertisement

OpenClaw is not an outlier. It is the pattern. “The bar to entry is extremely low,” Baer said. “Adding a skill can be as simple as uploading a Word doc or lightweight config file. That’s a radically different risk profile than compiled code.” She pointed to projects like ClawPatrol that have started cataloging and scanning for malicious skills, evidence the ecosystem is moving faster than enterprise defenses.

The ClawHavoc campaign, first reported by Koi Security in late January 2026, initially identified 341 malicious skills on ClawHub. A follow-up analysis by Antiy CERT expanded the count to 1,184 compromised packages across the platform. The campaign delivered Atomic Stealer (AMOS) through skill definitions with professional documentation. Skills named solana-wallet-tracker and polymarket-trader matched what developers actively searched for.

The MCP protocol layer carries similar exposure. OX Security reported in April that researchers poisoned nine out of 11 MCP marketplaces using proof-of-concept servers. Trend Micro initially found 492 MCP servers exposed to the internet with zero authentication; by April, that number had grown to 1,467. As The Register reported, the root issue lies in Anthropic’s MCP software development kit (SDK) transport mechanism. Any developer using the official SDK inherits the vulnerability class.

VentureBeat Prescriptive Matrix: Three-layer agent supply-chain audit

VentureBeat developed a Prescriptive Matrix by mapping the three attack layers documented in the research and incident reports above against the detection capabilities of current SAST, SCA, and agent-layer tools. Each row identifies what security teams should verify and where no scanner has coverage today.

Advertisement

Layer

Threat

Current detection

Why it misses

Advertisement

Recommended action

1. Code

Prompt injection in AI-generated code

SAST scanners

Advertisement

Most SAST tools have no detection category for prompt injection in AI-generated code

Confirm that SAST scans AI-generated code for prompt injection. If not, have an open vendor conversation this quarter.

2. Dependencies

Malicious MCP servers, agent skills, plugin registries

Advertisement

SCA tools

SCA generates no AI-specific bill of materials. Agent-layer dependencies are invisible.

Confirm SCA includes MCP servers, agent skills, and plugin registries in the dependency inventory.

3. Agent integration

Advertisement

Poisoned SKILL.md files, malicious instruction sets, adversarial rules files

None until April 2026

No tool inspects the semantic meaning of agent instruction files. Baer: “We’re not inspecting intent.”

Deploy Cisco Skill Scanner or Snyk mcp-scan. Assign a team to own this layer.

Advertisement

Baer’s diagnosis of Layer 3 applies across the entire matrix: “Current scanners look for known bad artifacts, not adversarial instructions embedded in otherwise valid skills.” Cisco’s open-source Skill Scanner and Snyk’s mcp-scan represent the first tools purpose-built for this layer.

Security director action plan

Here’s how security leaders can get ahead of the problem.

Inventory every agent bridge tool in the environment. This includes CLI-Anything, MCP connectors, Cursor rules files, Claude Code skills, GitHub Copilot extensions. If the development team is using agent bridge tools that have not been inventoried, the risk cannot be assessed.

Audit agent skill sources the same way package registries get audited. Baer’s framing is precise: “A skill is effectively untrusted executable intent, even if it’s just text.” Shut off ungoverned ingestion paths until controls are in place. Stand up a review and allowlisting process for skills. The OWASP Agentic Skills Top 10 (AST01: Malicious Skills) provides the procurement framework to align controls against.

Advertisement

Deploy agent-layer scanning. Evaluate Cisco’s open-source Skill Scanner and Snyk’s mcp-scan for behavioral analysis of agent instruction files. If dedicated tooling is unavailable, require a second engineer to read every SKILL.md before installation.

Restrict agent execution privileges and instrument runtime. AI coding agents should not run with the same credential scope as the developer who invoked them. Rees confirmed the structural flaw: The flat authorization plane means a compromised skill does not need to escalate privileges. Baer’s prescription: “Instrument runtime observability. What data is the agent accessing, what actions is it taking, and are those aligned with expected behavior?”

Assign ownership for the gap between layers. The most dangerous attacks succeed because they fall between detection categories. Assign a team to own the agent integration layer. Review every SKILL.md, MCP config, and rules file before it enters the environment.

The gap that already has a name

Baer underscored the dangers of this new attack vector. “This feels very similar to early container security, but we’re still in the ‘we’ll get to it’ phase across most orgs,” she said. She added that, at AWS, it took a few high-profile wake-up calls before container security became table stakes. The difference this time is speed. “There’s no build pipeline, no compilation barrier. Just content,” she said.

Advertisement

CLI-Anything is not the threat. It is the proof case that the agent integration layer exists, that it is growing fast, and that the attacker community has already found it. The 33,000 developers who starred the repository are telling security teams where software development is heading. Eighteen months ago, the detection category for agent-integration-layer poisoning did not exist. Cisco and Snyk shipped the first tools for it in April. The window between those two facts is closing. Security directors who have not begun inventory are already behind.

Source link

Continue Reading

Trending

Copyright © 2025